Sciweavers

2654 search results - page 99 / 531
» On Pairing Inversion Problems
Sort
View
ICRA
2006
IEEE
67views Robotics» more  ICRA 2006»
15 years 10 months ago
Working and Assembly Modes of the Agile Eye
Abstract— This paper deals with the in-depth kinematic analysis of a special parallel wrist, called the Agile Eye. The Agile Eye is a three-legged spherical parallel robot with r...
Ilian A. Bonev, Damien Chablat, Philippe Wenger
153
Voted
DAC
1989
ACM
15 years 8 months ago
An Efficient Finite Element Method for Submicron IC Capacitance Extraction
We present an accurate and efficient method for extraction of parasitic capacitances in submicron integrated circuits. The method uses a 3-D finite element model in which the cond...
N. P. van der Meijs, Arjan J. van Genderen
131
Voted
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
ACL
2010
15 years 2 months ago
Discriminative Pruning for Discriminative ITG Alignment
While Inversion Transduction Grammar (ITG) has regained more and more attention in recent years, it still suffers from the major obstacle of speed. We propose a discriminative ITG...
Shujie Liu, Chi-Ho Li, Ming Zhou
IJNSEC
2011
108views more  IJNSEC 2011»
14 years 11 months ago
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
We first analyze the security of a short signature scheme without random oracles called ZCSM scheme and point out that it cannot support unforgeable under the chosen message and ...
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li...